Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions

AJ Perez, S Zeadally - Computer Science Review, 2022 - Elsevier
The advent of Blockchain and smart contracts is empowering many technologies and
systems to automate commerce and facilitate the exchange, tracking and the provision of …

{BareCloud}: Bare-metal analysis-based evasive malware detection

D Kirat, G Vigna, C Kruegel - 23rd USENIX Security Symposium …, 2014 - usenix.org
The volume and the sophistication of malware are continuously increasing and evolving.
Automated dynamic malware analysis is a widely-adopted approach for detecting malicious …

Blockchain-based solutions for mobile crowdsensing: A comprehensive survey

R Yu, AM Oguti, MS Obaidat, S Li, P Wang… - Computer Science …, 2023 - Elsevier
Mobile crowdsensing (MCS) is an emerging data-driven paradigm that leverages the
collective intelligence of the crowd, their mobility, and the crowd-companioned smart mobile …

Design, implementation and verification of an extensible and modular hypervisor framework

A Vasudevan, S Chaki, L Jia, J McCune… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
We present the design, implementation, and verification of XMHF-an eXtensible and
Modular Hypervisor Framework. XMHF is designed to achieve three goals--modular …

The power of procrastination: detection and mitigation of execution-stalling malicious code

C Kolbitsch, E Kirda, C Kruegel - … of the 18th ACM conference on …, 2011 - dl.acm.org
Malware continues to remain one of the most important security problems on the Internet
today. Whenever an anti-malware solution becomes popular, malware authors typically …

Using hardware features for increased debugging transparency

F Zhang, K Leach, A Stavrou, H Wang… - 2015 IEEE Symposium …, 2015 - ieeexplore.ieee.org
With the rapid proliferation of malware attacks on the Internet, understanding these
malicious behaviors plays a critical role in crafting effective defense. Advanced malware …

Longitudinal study of the prevalence of malware evasive techniques

L Maffia, D Nisi, P Kotzias, G Lagorio, S Aonzo… - arxiv preprint arxiv …, 2021 - arxiv.org
By their very nature, malware samples employ a variety of techniques to conceal their
malicious behavior and hide it from analysis tools. To mitigate the problem, a large number …

[PDF][PDF] LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis.

C Spensky, H Hu, K Leach - NDSS, 2016 - cspensky.info
Dynamic-analysis techniques have become the linchpins of modern malware analysis.
However, software-based methods have been shown to expose numerous artifacts, which …

Hypervisor memory forensics

M Graziano, A Lanzi, D Balzarotti - … , RAID 2013, Rodney Bay, St. Lucia …, 2013 - Springer
Memory forensics is the branch of computer forensics that aims at extracting artifacts from
memory snapshots taken from a running system. Even though it is a relatively recent field, it …

{überSpark}: Enforcing Verifiable Object Abstractions for Automated Compositional Security Analysis of a Hypervisor

A Vasudevan, S Chaki, P Maniatis, L Jia… - 25th USENIX Security …, 2016 - usenix.org
We present überSpark (üSpark), an innovative architecture for compositional verification
of security properties of extensible hypervisors written in C and Assembly. üSpark …